Tamper-proof security mechanism against liar objects in JavaScript applicationsProWeb20
Many approaches has been proposed to dynamically secure client side web applications allowing developers to express they security policies using some sort of policy language. Those security policies are usually expressed in JavaScript, which has some features like the dynamic type coercion that allow an attacker to bypass those security mechanisms. This has been addressed by giving the developer the option of specifying “inspection types” during the policy declaration. Those inspection types are used to safely coerce the values used during the enforcement and afterwards. However, those mechanism are mostly limited to primitive types and require carefully design of the policy and its inspection types.
We propose the extension of a policy declaration and enforcement mechanism by constructing a coercion model for all the language built-ins. Then, the model is used to safely coerce all the operands or arguments used by the built-ins operations during the policy enforcement and afterwards removing the need of inspection types.
Mon 22 MarDisplayed time zone: Belfast change
13:00 - 14:30 | Session 1ProWeb21 at Virtual Space B Chair(s): Andrea Stocco Università della Svizzera italiana (USI) | ||
13:00 30mTalk | Rec.HTML: Typed Declarative HTMLProWeb21 ProWeb21 Pre-print | ||
13:30 30mTalk | Tamper-proof security mechanism against liar objects in JavaScript applicationsProWeb20 ProWeb21 Angel Luis Scull Pupo Sofware Languages Lab, Vrije Universiteit Brussel, Jens Nicolay Vrije Universiteit Brussel, Belgium, Elisa Gonzalez Boix Vrije Universiteit Brussel, Belgium Pre-print | ||
14:00 30mTalk | Wassail: a WebAssembly Static Analysis LibraryProWeb21 ProWeb21 Pre-print |